P-660HW-T v2 User’s Guide
140
Chapter 9 Firewalls
Some of the most common IP ports are:
9.4.2 Types of DoS Attacks
There are four types of DoS attacks:
1
Those that exploit bugs in a TCP/IP implementation.
2
Those that exploit weaknesses in the TCP/IP specification.
3
Brute-force attacks that flood a network with useless data.
4
IP Spoofing.
5
"
Ping of Death
" and "
Teardrop
" attacks exploit bugs in the TCP/IP implementations of
various computer and host systems.
• Ping of Death uses a "ping" utility to create an IP packet that exceeds the maximum
65,536 bytes of data allowed by the IP specification. The oversize packet is then sent to
an unsuspecting system. Systems may crash, hang or reboot.
• Teardrop attack exploits weaknesses in the re-assembly of IP packet fragments. As data is
transmitted through a network, IP packets are often broken up into smaller chunks. Each
fragment looks like the original IP packet except that it contains an offset field that says,
for instance, "This fragment is carrying bytes 200 through 400 of the original (non
fragmented) IP packet." The Teardrop program creates a series of IP fragments with
overlapping offset fields. When these fragments are reassembled at the destination, some
systems will crash, hang, or reboot.
6
Weaknesses in the TCP/IP specification leave it open to "
SYN Flood
" and "
LAND
"
attacks. These attacks are executed during the handshake that initiates a communication
session between two applications.
Figure 79
Three-Way Handshake
Table 48
Common IP Ports
21
FTP
53
DNS
23
Telnet
80
HTTP
25
SMTP
110
POP3
Summary of Contents for P-660HW-T - V2
Page 2: ......
Page 7: ...P 660HW T v2 User s Guide Safety Warnings 7 This product is recyclable Dispose of it properly...
Page 26: ...P 660HW T v2 User s Guide 26 List of Figures...
Page 40: ...P 660HW T v2 User s Guide 40 Chapter 1 Getting To Know Your ZyXEL Device...
Page 54: ...P 660HW T v2 User s Guide 54 Chapter 2 Introducing the Web Configurator...
Page 74: ...P 660HW T v2 User s Guide 74 Chapter 4 Bandwidth Management Wizard...
Page 92: ...P 660HW T v2 User s Guide 92 Chapter 5 WAN Setup...
Page 124: ...P 660HW T v2 User s Guide 124 Chapter 7 LAN Setup...
Page 156: ...P 660HW T v2 User s Guide 156 Chapter 10 Firewall Configuration Figure 85 Firewall Edit Rule...
Page 170: ...P 660HW T v2 User s Guide 170 Chapter 10 Firewall Configuration...
Page 174: ...P 660HW T v2 User s Guide 174 Chapter 11 Content Filtering...
Page 178: ...P 660HW T v2 User s Guide 178 Chapter 12 Static Route...
Page 190: ...P 660HW T v2 User s Guide 190 Chapter 13 Bandwidth Management...
Page 194: ...P 660HW T v2 User s Guide 194 Chapter 14 Dynamic DNS Setup...
Page 206: ...P 660HW T v2 User s Guide 206 Chapter 15 Remote Management Configuration...
Page 218: ...P 660HW T v2 User s Guide 218 Chapter 16 Universal Plug and Play UPnP...
Page 224: ...P 660HW T v2 User s Guide 224 Chapter 17 System...
Page 244: ...P 660HW T v2 User s Guide 244 Chapter 18 Logs...
Page 250: ...P 660HW T v2 User s Guide 250 Chapter 19 Tools...
Page 256: ...P 660HW T v2 User s Guide 256 Chapter 21 Troubleshooting...
Page 260: ...P 660HW T v2 User s Guide 260 Appendix A Product Specifications...
Page 280: ...P 660HW T v2 User s Guide 280 Appendix D Wall mounting Instructions...
Page 308: ...P 660HW T v2 User s Guide 308 Appendix G Command Interpreter...
Page 320: ...P 660HW T v2 User s Guide 320 Appendix J Splitters and Microfilters...
Page 334: ...P 660HW T v2 User s Guide 334 Appendix K Wireless LANs...